FortiDAST
FortiDAST performs automated black-box dynamic application security testing of web applications to identify vulnerabilities that bad actors may exploit.
rdiwakar
Staff
Staff
Article Id 336367
Description

This outbreak alert on Adobe ColdFusion covers two vulnerability that is CVE-2023-26359 and CVE-2023-26360.

 

CVE-2023-26359 is a critical vulnerability affecting older versions of Adobe ColdFusion. It's classified as a Deserialization of Untrusted Data vulnerability, which means that an attacker can potentially execute arbitrary code on the server by sending specially crafted serialized data.


CVE-2023-26360 is a critical vulnerability affecting older versions of Adobe ColdFusion. Initially classified as an improper access control issue, it was later determined to be a deserialization of untrusted data vulnerability, similar to CVE-2023-26359.


This article describes the assessment of deserialization vulnerability in Adobe Coldfusion software.

Scope FortiDAST Scripting Engine updated in version 24.1.0-build012(GA)
Solution

Detection against that vulnerability is empowered by the FortiDAST Scripting Engine (FSE).

This technology enables FortiDAST to assess remotely with a high level of confidence if an asset is vulnerable to a specific vulnerability by testing the disarmed exploit against the asset itself.

 

To configure the scan, it will be necessary to enable the FSE group signature 'coldfusion' which will select the underlying script as per the scan requirement: ‘CVE-2023-26360 Adobe ColdFusion Untrusted Data Vulnerability’


For reference, a step-by-step guide on how to configure FortiDAST to trigger FSE can be found on Fortinet’s blog:
https://www.fortinet.com/blog/business-and-technology/fortipentest-exploit-engine-a-new-security-ars...

Contributors